Netinfo Security ›› 2025, Vol. 25 ›› Issue (9): 1329-1337.doi: 10.3969/j.issn.1671-1122.2025.09.001

Previous Articles     Next Articles

Cross-Function Behavior Analysis and Constraint Technology for Serverless Applications

ZHAN Dongyang1, HUANG Zilong1, TAN Kai1(), YU Zhaofeng1, HE Zheng2, ZHANG Hongli1   

  1. 1. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, China
    2. Heilongjiang Climate Center, Harbin 150030, China
  • Received:2025-06-03 Online:2025-09-10 Published:2025-09-18

Abstract:

Applications in Serverless computing are decomposed into functions and run in different containers, they have the advantage of being lightweight and was widely used, but they also brings security risks. This architecture exposes the internal interfaces of the program to the network, increases the attack surface and security risks such as unauthorized access, and threatens the integrity of the control flow and data flow. However, existing security monitoring methods are difficult to protect the integrity of the control flow and data flow between containers (or functions) in Serverless computing. As a result, this paper proposed a cross-function behavior analysis and constraint technology for Serverless applications, by studying the extraction method of the complete access model between functions based on static analysis, real-time access control across functions was performed. Experimental results show that the method achieves an average of 97.54% as well as 92.87% for the anomalous control flow and data flow identification rate, and reduces the monitoring false alarms by more than 10%, which is able to improve the security of Serverless computing.

Key words: Serverless computing, static analysis, access control

CLC Number: